The Product

Every vendor, audit-ready,
without lifting a finger.

ZeroRisk continuously vets every vendor against your frameworks, keeps a verifiable certificate on file for each one, and gives you a single live view of compliance — so the next audit is a hand-off, not a fire drill.

Book a demo See pricing
Framework assessments view — GDPR, ISO 27001 and SOC 2 alignment, with issue severity and qualification status per framework
0 hours to audit-ready Signed by a named human Re-vetted every 90 days
The six-point review

Every vendor, every framework, every clause. Evidence collected.

Every vendor in your portfolio gets the same six-point review. Each item is sourced, time-stamped, and attached to the verdict file.

01

Certification & scope

We verify the vendor's certifications (ISO 27001, SOC 2, ISO 27701, ISO 22301, etc.) are valid, in-date, and the scope statement covers the services you actually buy.

ISO RegistryAICPABSI
02

Framework mapping

We map the vendor's controls to the specific clauses of your frameworks (GDPR, NIS2, DORA, CRA, SOC 2, ISO). Gaps are flagged at the clause level.

GDPRNIS2DORACRA
03

Sub-processor lineage

Every named sub-processor in the vendor's chain is captured, monitored, and re-vetted at the same cadence as the primary.

DPA exhibitsRoPAVendor disclosures
04

Data residency & transfers

Where data is processed, where it's stored, what transfer mechanism applies (SCCs, Adequacy, BCRs), and whether the residency claim matches the contract.

DPASCCsTIA
05

Security & incident posture

Pen-test cadence, vulnerability disclosure, breach history, MFA defaults, encryption at rest & in transit, BC/DR tested annually.

SOC 2ISO 27001Trust pages
06

Contractual & liability terms

DPA in place, liability caps, audit rights, breach-notification SLAs, deletion clauses, and exit assistance — all attached to the verdict.

MSADPASLA exhibit
Inside the product

What you actually get.

No more juggling multiple trust centres. Everything is in one dashboard — vendor list, compliance status, alerts, and audit-ready records.

Vendor view

One screen per vendor. The whole story.

Every vendor opens to the same briefing: status, business criticality, internal owner, a severity-weighted breakdown of open issues, and qualification status across every framework you care about. No clicking through five tabs to assemble the picture.

Vendor overview — status, criticality, owner, issues breakdown, framework qualification summary
Framework check detail — source URL, quote, last verified, highlighted passage in the vendor's DPA
Evidence trail

Every verdict, fully evidenced.

Drill into any clause and you see the actual evidence: the source URL, the verbatim quote, the date it was last verified, and the highlighted passage from the vendor's own DPA — attached. No hand-waving. Every pass and fail is auditable.

Framework view

Every framework, side by side.

For each vendor, see how every framework lands: open issues, severity profile, and qualification status — in one table. Filter, sort, search; or click into any row for the clause-level breakdown.

Framework assessments table — GDPR, ISO 27001, SOC 2 with severity bars and qualification status
Activity log — timestamped audit trail of every reviewer action against a vendor
Audit trail

The audit trail writes itself.

Every reviewer action — issue tolerated, check re-opened, framework re-assessed — is timestamped and attributed to the operator who made it. When the auditor asks “why did this vendor stay qualified?”, the answer is one filter away.

Bulk upload vendors via CSV, XLS or XLSX with AI auto-fill
Onboarding

Bring your whole vendor list in one upload.

Drop in a CSV, XLS, or XLSX. AI fills the blanks — name, website, description, sensitivity, criticality, cadence — so vetting starts in minutes, not weeks.

Tolerate issue modal — capture the reasoning and supporting evidence for accepted risks
Workflow

Tolerate, with the reasoning on the record.

Sometimes a finding is real but the business accepts the risk. Capture the why, attach the supporting evidence, and the decision lives with the vendor — for the next reviewer, and the next auditor.

EXPORT
Auditor asks — you click “export”.
CERTIFICATES
Verifiable proof per vendor, refreshed automatically.
ALERTS
Only the changes that matter, on average ~1/wk per vendor.
Beyond vendor vetting

More built into the platform.

Vendor risk is the spine. Around it sits the rest of the work your GRC team would otherwise do by hand — included in every plan.

Compliance Profile

We start by mapping your obligations — the regulations, contracts, and customer commitments that bind you. Every vendor is then judged against that profile, not a generic one. The scope you actually need, nothing you don't.

Custom vetting frameworks

Your scope, your rules. Add internal policies, contractual control sets, or industry-specific frameworks alongside the standard ones — and we'll vet every vendor against the lot.

Fourth-party risk

See past your vendors, into theirs. Sub-processors are continuously surfaced and risk-assessed.

  • Automated scanning — sub-processor lists, trust pages, and DPA exhibits are watched for changes.
  • Self-declare / self-certify — partners attest directly through a shared portal, signed and time-stamped.

Software Bill of Materials

Know what's actually in the code. Ingest SBOMs (CycloneDX, SPDX) from your vendors, surface critical components and known CVEs, and get alerted when an upstream dependency goes south. Required for CRA and increasingly asked for under DORA.

Vendor Security Assessment Certificate

Issued to

ABC Corporation

This certifies that ZeroRisk has conducted vendor risk assessments on behalf of ABC Corporation. All findings, supporting evidence, and full activity logs are available within the ZeroRisk platform for each vendor listed below.

Vendor Criticality Status Date last reviewed
Acme Cloud CriticalNeeds review Apr 12, 2026
Stripe High In order Apr 09, 2026
Datadog High Under assessmentApr 06, 2026
HubSpot High Needs review Apr 02, 2026
Snowflake High Needs review Mar 28, 2026

Framework-specific risk interpretations are provided for GDPR, ISO/IEC 27001, SOC 2, NIS2, DORA, and CRA.

GDPR
ISO
27001
SOC 2
NIS2
DORA
CRA

This assessment does not represent compliance certification. For full findings and evidence, view each vendor record in the ZeroRisk platform.

ZeroRisk Issued at: Apr 14, 2026

The certificate is the artefact.

Auditors don't read scores. They read verdicts. Every reviewed vendor in your portfolio gets a signed, dated, named security assessment certificate — the full six-point review, the framework mapping, the sub-processor list, and the certification snapshots that back it.

It lives in your master agreement appendix. You hand it to auditors, regulators, and your own board. One document, six lenses, signed by an operator with a name on it.

  • Human-signed verdict on every signature
  • Permanent verdict ID, queryable in your portal
  • Auto-attaches to your DPA exhibits
  • Re-issued on every quarterly re-vet
The service, deconstructed

Four operational commitments. Written down.

Every plan ships with the same four service commitments — the cadence and team size scale, the structure doesn't.

01 / Vetting cadence

Quarterly re-vet, plus event-driven.

Every vendor re-runs the six-point review at minimum every 90 days. Material events (cert lapse, breach disclosure, sub-processor change) trigger an out-of-band re-vet within 5 business days.

Contractual SLA
02 / Constant monitoring

Always-on, signal-only.

Between scheduled re-vets, agents watch certifications, sub-processor pages, breach disclosures, and policy changes. On average, each vendor sees about one material update per week — you only get the alert when action is needed.

Always-on
03 / Audit-ready packets

One click, any framework.

Every vendor file is pre-mapped to your in-scope frameworks. When the auditor sends the request, you have everything — full evidence, versioned, dated, traceable.

On demand
04 / Named operator

Verified by a human.

Every verdict carries a named human reviewer, not a team mailbox. They're your escalation path for re-vets, scope changes, and quarterly reviews. Continuity is contractual.

Named & signed

This is not a one-time review.

Vetting on day one is the easy part. Confidence holds because the loop never stops — agents watch, operators decide, packets stay current.

Day 1–14

Onboard & six-point review

Send your vendor list. We pull DPAs, certifications, sub-processor disclosures, and run the review. First verdicts land within two weeks.

Operators · Agents
Continuous

Continuous monitoring

Cert expiries, breach disclosures, M&A events, sub-processor changes, and trust-page updates are watched in the background — on average ~1 material update per vendor per week.

Agents
Quarterly

Scheduled re-vet

Every 90 days the full six-point review runs again. Verdict files are re-signed, attached to your DPA exhibits, and pushed to your portal.

Operators
Always

Audit-ready, on tap

While the verdict is current, an evidence packet is one click away — mapped to whichever in-scope framework your auditor asks about. No fire drill, no spreadsheet hunt.

Operators · Portal

See a sample vetting run.

30-minute walkthrough with a human reviewer. Bring three vendors; we'll show you what their status would look like and what monitoring would surface.

Book a walkthrough See pricing